Seung Dong Yoo, Jinho Yoo, "Determinants of Willingness To Pay for Personal Information Protection." Journal of the Korean Institute of Information Security and Cryptology, v.24 no.4, pp 695-703, 2014.
Sang-Jun Lee, Dong Hoon Lee,"Real time predictive analytic system design and implementation using Bigdata-log" Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.6, Dec. 2015.
Sang-Jun Lee et al.(Unetsystem), “Integrated log analysis system,” Patent 10-1484290, 2015.
Mark Troester, "Big Data Meets Big Data Analytics", SAS white paper, 2012.
Kwang-Man KO, Beom-Chul Kwon, Sung-Chul Kim, Sang-Jun Lee, “Development of Statistical Prediction Engine for Integrated Log Analysis Systems,” Journal of The 2013 Fall Conference of the KIPS, Vol. 20, No. 2, 2013.
Jungduk Kim, "The Management System and Governance for Personal Information", Journal of the Korean Institute of Information Security and Cryptology, v.18, n.6, pp 1-5, 2008.12.
John Gantz, David Reinsel, “Extracting Value from Chaos”, IDC IVIEW June, pp.6, 2011.
Jin-Ho Yoo, Sang-Ho Jie, Jong-In Lim, “Estimating Direct Costs of Enterprises by Personal Information Security Breaches”, Journal of the Korean Institute of Information Security and Cryptology, v.19 no.4, pp.63-75, 2009.
Jerry Shenk, "SANS Seventh Annual Log Management Survey Report," pp. 5-6, April. 2011.
James Manyika, Michael Chui, “Big data: The next frontier for innovation, competition, and productivity”, McKinsey Global Institute, pp.1, 2011. 05.
ISO, “ISO/IEC 27001-information security management”, 2013: The ISO 27000 family of standards helps organizations keep information assets secure.
Humanities, and Sociology Vol.5, No.4, August (2015), pp.667-674.
Gregory Piatetsky, "R leads Rapid Miner, Python catches up, Big Data tools grow, Spark ignites," Retrieved May. 17. 2015.
Enterprise Strategy Group(ESG) Report, Digital Archive Market Forecast 2010-2015, July 2010.
Choong-Hyun Yoo, “Technology Trends in Big Data Analytics and Introduction to R," NexR, 2012.